frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Serving a Website on a Raspberry Pi Zero Running in RAM

https://btxx.org/posts/memory/
49•xngbuilds•1h ago•12 comments

An Introduction to Meshtastic

https://meshtastic.org/docs/introduction/
199•ColinWright•5h ago•73 comments

Google Cloud Fraud Defence is just WEI repackaged

https://privatecaptcha.com/blog/google-cloud-fraud-defence-wei/
114•ribtoks•2h ago•33 comments

PC Engine CPU

https://jsgroth.dev/blog/posts/pc-engine-cpu/
52•ibobev•2h ago•11 comments

Poland is now among the 20 largest economies

https://apnews.com/article/poland-economy-growth-g20-gdp-26fe06e120398410f8d773ba5661e7aa
574•surprisetalk•4h ago•494 comments

Podman rootless containers and the Copy Fail exploit

https://garrido.io/notes/podman-rootless-containers-copy-fail/
48•ggpsv•3h ago•5 comments

Show HN: Git for AI Agents

https://github.com/regent-vcs/re_gent
34•doshay•2h ago•18 comments

Cloudflare to cut about 20% of its workforce

https://www.reuters.com/business/world-at-work/cloudflare-cut-over-1100-jobs-2026-05-07/
1118•PriorityLeft•20h ago•762 comments

Canvas online again as ShinyHunters threatens to leak schools’ data

https://www.theverge.com/tech/926458/canvas-shinyhunters-breach
854•stefanpie•18h ago•558 comments

A web page that shows you everything the browser told it without asking

https://sinceyouarrived.world/taken
123•mwheelz•3h ago•79 comments

Rumors of my death are slightly exaggerated

833•CliffStoll•2d ago•109 comments

GeoJSON

https://geojson.org/
102•tosh•6h ago•45 comments

Maybe you shouldn't install new software for a bit

https://xeiaso.net/blog/2026/abstain-from-install/
729•psxuaw•17h ago•390 comments

ClojureScript Gets Async/Await

https://clojurescript.org/news/2026-05-07-release
221•Borkdude•9h ago•53 comments

Dirtyfrag: Universal Linux LPE

https://www.openwall.com/lists/oss-security/2026/05/07/8
735•flipped•21h ago•303 comments

The map that keeps Burning Man honest

https://www.not-ship.com/burning-man-moop/
721•speckx•1d ago•334 comments

Pinocchio is weirder than you remembered

https://storica.club/blog/pinocchio-in-italian/
252•cemsakarya•2d ago•102 comments

Ask HN: We just had an actual UUID v4 collision...

62•mittermayr•8h ago•80 comments

Dithering with CSS

https://ikesau.co/blog/dithering-with-css/
92•speckx•4d ago•25 comments

Inventing Cyrillic

https://www.historytoday.com/archive/history-matters/inventing-cyrillic
30•lermontov•2d ago•64 comments

Hackers breach JDownloader's website to serve malware-laced downloads

https://www.neowin.net/news/if-you-downloaded-this-popular-software-recently-you-might-have-insta...
75•bundie•4h ago•23 comments

Agents need control flow, not more prompts

https://bsuh.bearblog.dev/agents-need-control-flow/
551•bsuh•23h ago•266 comments

QBE – Compiler Back End

https://c9x.me/compile/
57•smartmic•9h ago•11 comments

GPT-5.5 Price Increase: What It Costs

https://openrouter.ai/announcements/gpt55-cost-analysis
158•gmays•15h ago•44 comments

A polynomial autoencoder beats PCA on transformer embeddings

https://ivanpleshkov.dev/blog/polynomial-autoencoder/
84•timvisee•3d ago•22 comments

Brazil's Pix payment system faces pressure from Visa and Mastercard

https://www.elciudadano.com/en/brazils-pix-payment-system-faces-pressure-from-visa-and-mastercard...
341•wslh•22h ago•289 comments

Singapore introduces caning for boys who bully others at school

https://www.theguardian.com/world/2026/may/06/singapore-caning-school-bullies
297•rustoo•2d ago•436 comments

Tesla is recalling its cheaper Cybertruck because the wheels might fall off

https://www.theverge.com/transportation/926741/tesla-cybertruck-cheaper-recall
152•droidjj•2h ago•151 comments

Hardening Firefox with Claude Mythos Preview

https://hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/
307•HieronymusBosch•1d ago•134 comments

Natural Language Autoencoders: Turning Claude's Thoughts into Text

https://www.anthropic.com/research/natural-language-autoencoders
347•instagraham•22h ago•108 comments
Open in hackernews

Gmail will soon stop support for the 3DES encryption cipher for incoming SMTP

https://workspaceupdates.googleblog.com/2025/05/update-for-gmail-support-for-the-3des-encryption-cipher-for-incoming-smtp-connections.html
48•gnabgib•1y ago

Comments

fishgoesblub•1y ago
My reading has gotten worse over the years, it took me multiple times re-reading to realise this isn't deprecating Gmail on the Nintendo 3DS.
toast0•1y ago
I think they did that last year, when they killed the HTML version of Gmail. I kind of really doubt the 3DS browser can run the regular gmail interface.
jxjnskkzxxhx•1y ago
> My reading has gotten worse over the years

Do you spend a lot of time on your phone?

londons_explore•1y ago
Don't worry - it only took 9 years between 3DES being publicly known to have severe vulnerabilities and Google deciding it isn't appropriate for protecting perhaps the most sensitive dataset in the world (private emails).

CVE-2016-2183...

SchemaLoad•1y ago
Was Gmail actively sending emails with this? Or just not blocking emails from other servers using it? Breaking email deliverability is a pretty serious action to take.
behringer•1y ago
The broken systems would have repaired their systems 8 years ago when users complained.
jeroenhd•1y ago
With Gmail's spam filter being the way it is, email deliverability issues because of 3DES are probably invisible next to the normal email being silently discarded.

Users trying to send email to an outgoing SMTP server that hasn't been maintained this decade may see a warning, but I doubt there are still that many broken server out there that can't be replaced or updated on short notice once the domain admin gets told Gmail can't reach them.

tialaramex•1y ago
The latter.

What we're talking about here is a TLS negotiation. So, when you connect to a TLS server, in this case to deliver email to Gmail over SMTP - you tell it what ciphers you know [the RFCs list "Mandatory to implement" ciphers, but the IETF do not have an enforcement arm, so you could choose to list only ciphers you made up here for whatever that's worth] - and then the server picks one from your list.

Google's change here is when a client calls Gmail and professes that the least awful cipher it knows is 3DES, that's too bad, connection failed.

So yes, this only affects email which was previously using this awful cipher and now just can't be delivered instead.

agildehaus•1y ago
3DES isn't as easy to exploit versus, say SSLv3 and RC4 which were both quickly removed.
zzq1015•1y ago
Probably not just that. 3DES is the last cipher supported by "old" clients (I'm talking Windows XP). If you remove 3DES, the TLS connection will simply fail.

You can never imagine how many people are still using WinXP, or other forgotten legacy clients/servers that only support up to TLS 1.0 and RC4/DES/3DES without realizing it.

everfrustrated•1y ago
Article is talking server-server flows not clients.
waste_monk•1y ago
Would this not also include desktop email clients using SMTP for mail submission?
zzq1015•1y ago
Yeah, despite what it says, I really think Google is gonna ditch 3DES across the board, starting from Gmail.
waste_monk•1y ago
>You can never imagine how many people are still using WinXP

XP still has 0.38% of market share (specifically Windows non-mobile platforms) according to [1], not sure about absolute numbers.

>If you remove 3DES, the TLS connection will simply fail.

Strong backwards compatibility is great, but continuing to run XP 10+ years after EOL is a personal choice and its remaining users should not expect the world to continue to accomodate them forever. I don't think it's unreasonable to deny them service in this case.

[1] https://gs.statcounter.com/os-version-market-share/windows/d...

zzq1015•1y ago
0.38% of what?

For sites like Google, it's still too large to ignore.

Also, a fun fact: Google still serves plain HTTP for really old clients, just in case the client barely supports HTTPS.

waste_monk•1y ago
>0.38% of what?

Machines visiting sites with statcounter tracking widgets (and presumably not running with scripts/cookies disabled etc. ).

That works out to be ~5ish million internet connected XP machines, apparently[1].

>For sites like Google, it's still too large to ignore.

They do this sort of thing all the time [2]. IIRC Reader still had several million users when it got the axe.

[1] https://www.computerworld.com/article/2091600/youre-not-real...

[2] https://killedbygoogle.com/

timewizard•1y ago
Triple DES was always just sort of funny to me. "DES is completely broken. So we'll just do it three times in a row now." Well, fun while it lasted, I guess.
zzq1015•1y ago
DES is weak because it only uses 56 bits, and you can brute force it. 3DES has 168 (56*3) bits with the security of 112 (56*2) bits.
scrapheap•1y ago
Yes, the problem with 3DES isn't the key length, it's the 64bit block size which opens it up to birthday attacks if it's used in a stream for a long enough with the same key. Defending against this sort of attack is one of the reasons that a lot of VPN setups rekey the encrypted connection with the client at regular intervals. Note that once Gmail disables 3DES it's minimum block size supported will be 128bits.
NicolaiS•1y ago
Biggest reason to avoid DES is the short key. Double-DES doesn't fix that due to the meet-in-the-middle attack. Triple DES "solves" the short key problem.
aspenmayer•1y ago
Email on Gmail (or on any cloud email service provider subject to US jurisdiction) older than 180 days is available upon request without a warrant.

> Under ECPA, it is relatively easy for a government agency to demand service providers hand over personal consumer data stored on the service provider's servers. Email that is stored on a third party's server for more than 180 days is considered by the law to be abandoned. All that is required to obtain the content of the emails by a law enforcement agency is a written statement certifying that the information is relevant to an investigation, without judicial review.

https://en.wikipedia.org/wiki/Electronic_Communications_Priv...

eurleif•1y ago
That's the statute, but arguably it's superseded by the Fourth Amendment, and many companies have a policy of treating it as such. Google's policy[0] is to disregard the ECPA 180 day rule, and to always require a warrant for content:

>On its face, ECPA seems to allow a government agency to compel a communications provider to disclose the content of certain types of emails and other content with a subpoena or an ECPA court order (described below). But Google requires an ECPA search warrant for contents of Gmail and other services based on the Fourth Amendment to the U.S. Constitution, which prohibits unreasonable search and seizure.

Essentially, they're saying that they think they would win a constitutional challenge if the government were to try and fight them on this. It doesn't look like the government has taken them up on that to date.

Similar policy from Apple[1]:

> For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search warrant issued upon a showing of probable cause, or customer consent.

Meta[2]:

>A search warrant issued under the procedures described in the Federal Rules of Criminal Procedure or equivalent state warrant procedures upon a showing of probable cause is required to compel the disclosure of the stored contents of any account, which may include messages, photos, videos, timeline posts, and location information.

[0] https://support.google.com/transparencyreport/answer/9700059...

[1] https://www.apple.com/legal/privacy/law-enforcement-guidelin...

[2] https://about.meta.com/actions/safety/audiences/law/guidelin...

hsbauauvhabzb•1y ago
Is ‘stored’ in this context implying unread also, or is using IMAP to maintain a local and remote sync considered ‘abandoned’?
1vuio0pswjnm7•1y ago
Does Google make it easy for users to save and search through old mail.
zzq1015•1y ago
"The obvious way to avoid these attacks is to stop using legacy 64-bit block ciphers. Alternatively, the attack can be mitigated by rekeying the session frequently."

- https://sweet32.info/

Although I doubt the older clients even implement rekeying at all...

fweimer•1y ago
This can be mitigated by limiting the amount of data that is transmitted with a single 3DES session key. I doubt that Gmail accepts that many gigabytes of data in a single SMTP session anyway, so I doubt it's impacted by this flaw.

(AES-GCM requires rekeying, too, also at intervals that exceeds typical SMTP session lengths, and is not considered terminally broken because if this.)

entropyie•1y ago
Unless folks are regularly sending 32GB emails, this CVE is not severe in this context.
danielbln•1y ago
I try to keep all of my mails to just under 31GB.
jeroenhd•1y ago
You don't need to send 32GB of emails, you only need to send 32GB of traffic. Setting up a TLS connection and sending EHLOs ad infinitum can generate traffic without hitting any "message size < 8MiB" filters.
jsnell•1y ago
What's the threat model here? A scenario where the attacker controls the plaintext being sent but doesn't know what the plaintext is seems quite unlikely.
xtajv•1y ago
> A scenario where the attacker controls the plaintext being sent but doesn't know what the plaintext is seems quite unlikely.

https://en.wikipedia.org/wiki/Chosen-plaintext_attack#In_pra... comes to mind.

(Not sure what attack scenarios OP had in mind -- iust sharing the usual CPA example)

jsnell•1y ago
The suggested attack was the attacker writing an infinite stream of EHLOs on a connection. What's the scenario where an attacker has full control of the SMTP control framing, but doesn't have attack to the payloads?
sim7c00•1y ago
Search for 'sweet32 attack' . it's pretty much this technique - i think. The CVE mentions that attack type atleast, and it has its own .info site to explain what it is...

The message type jeroenhd mentioned is useful here, as it generates a predictable response from the server, without having to sent actual email over it or authenticate against it. (so an external attacker can generate the needed encrypted traffic, with predictable / known plaintext). They dont know emails being sent, but they do know the response to EHLO. once the attack is acheived, they have a key, and can decrypt also other traffic sent by the service if you manage to capture it.

I'd say the thread-model or whatever is thus, someone who can sniff your email traffic and can speak to your smtp server. (if they can do the first, certainly they can do the second.)

its much harder to get to the email traffic outside of your network, but not impossible. (ISP for example can grab it easily.... - so in certain regions this might be a big risk - nasty governemnts etc..)

jsnell•12mo ago
In your example, the attacker already has the session key for the TLS connection, so they don't need to run this attack to decrypt the traffic on that connection. And running the attack does not help them decrypt any other connections.

Sweet32 depended on the attacker being able to send an arbitrary amount of traffic over a connection where they did not control either of the endpoints, and with that connection also carrying the data they wanted to steal. That doesn't map at all to the proposed "infinite stream of EHLOs" attack.

entropyie•12mo ago
If it's your connection, why on earth would you want to break the crypto? You already have the keys and the message...
ahofmann•1y ago
I'm a bit confused. On a technical level emails are even less secure than postcards. Everyone involved transporting it, can read, copy and save it. So how are emails private and the most sensitive dataset in the world?

I know that my email account is the most important part in my digital life and if someone would get hold of it, I'm basically dead. But the emails I get and send are not private at all.

belter•1y ago
Google business is selling ads not security. :-)

Look at all the insecure ciphers they will still allow you to connect with: https://www.ssllabs.com/ssltest/analyze.html?d=gmail.com&lat...

zinekeller•1y ago
This is highly misleading, especially that Gmail still accepts plaintext SMTP communications. In that context, this is more of a code cleanup rather than the security brouhaha that this is implying.
Meekro•1y ago
Can someone explain why this is important enough to land on the HN front page? Are people being inconvenienced by this or something?
foobarkey•1y ago
Crqpping on google is meta
syeare•1y ago
I can't explain it, no unfortunately

But what about someone maintaining and developing, say, an obscure e-mail client?

Meekro•1y ago
If someone's maintaining an old/obscure email client, I would expect them to be importing a TLS library under the "don't roll your own crypto" principle. Assuming it's been updated at some point in the last ~15 years, it's probably capable of auto-negotiating to something better than 3DES.

And if it hasn't been updated for that long, it probably doesn't support TLS 1.2 and is getting rejected from just about everything for that reason.

DaiPlusPlus•1y ago
Statistically, someone, somewhere, has a VAX box that hasn't been rebooted since before the fall of the Soviet Union, running their org's MTA with a comically outdated cryptosuite. Anyone running vaxen that old is bound to be a regular here on HN.
Meekro•1y ago
Unfortunately, that box is going to have increasing difficulty connecting to anyone at all. TLS 1.2 was added to OpenSSL around 2010, and de-facto mandated around 2020. Any SSL/TLS software from before that will increasingly find its connections rejected.
jeroenhd•1y ago
The world of email is full of zombie servers that should've died years ago but still linger. Configuring your email server to require the security that was considered "modern" ten years ago in terms of websites will still get you delivery failures when you start dealing with email servers. There's a reason Google is deprecating 3DES now, and not ten years ago when they reasonably should've.

Because email customers on all sides want email to arrive, there's little incentive to modernize configurations or requirements. When you disable ancient cryptography, you'll get blamed for your change making email from someobscurewebsite.gov no longer arriving. For a significant amount of mail servers, you can pick between "accept a random self-signed certificate using a cipher suite from the late 2000s" or "send email over unencrypted SMTP", and you just have to hope that the email server doesn't have your domain configured as "secure transmission required".

I'm in favour of Google just breaking the old, broken mail servers, but I wouldn't assume that TLS 1.2 is available on email servers.

andreareina•1y ago
To me it’s surprising in the sense that it was even still supported.
Meekro•1y ago
Yeah, apparently OpenSSL dropped it almost 10 years ago.
zzq1015•1y ago
I had no idea that you can filter/reject certain TLS versions/ciphers (on Gmail servers) before seeing this on the HN front page.

https://support.google.com/a/answer/9795993

Meekro•1y ago
If you've never used a TLS library such as Go's crypto/tls, that's understandable-- this is stuff most programmers never need to think about. Fortunately TLS does work pretty well: both sides of an encrypted connection will auto-negotiate and pick the strongest cipher that they both support.

TLS libraries do drop old, weak ciphers from time to time. But thanks to auto-negotiating, this will only be a problem if your TLS lib is so out-of-date that it doesn't support any still-trusted alternatives.

Which brings me back to why this story is so strange: "Gmail upgrades TLS library, drops old insecure algorithm that OpenSSL had dropped almost 10 years ago."

zzq1015•1y ago
Oh, I meant on Gmail servers.

I always customize TLS versions and cipher suites because I don't trust the defaults.

AFAIK you can customize them on:

- Chrome & Firefox (can only enable/disable ciphers, no reordering, PQ ciphers supported since 2024)

- OpenSSL (by customizing openssl.cnf, PQ ciphers supported since 3.5)

- curl

- nginx/apache

- OpenSSH (I enabled PQ ciphers too)

- Multiple programming libraries

- and others...

Also, clients and servers don't "pick the strongest cipher that they both support". Servers select the cipher ultimately, and they can be misconfigured to pick, for example, 3DES over AES.

cedilla•1y ago
Because it's interesting?

The 3DES saga is still ongoing...

gpvos•1y ago
Does Gmail support receiving unencrypted SMTP? And can you see whether encryption was used during transport?
aaronmdjones•1y ago
Yes, and yes. Click the three dots icon in the top right (next to the star icon etc) and click "Show original". Look for the Received: header added by Google's servers. If it says SMTP, it was a very old MTA on the other side. If it says ESMTP, it was newer. If it says SMTPS or ESMTPS, it was secured with TLS; then it will also say the TLS version and ciphersuite below it.
gpvos•12mo ago
Hmm, so for ESMTP it doesn't tell you the ciphersuite but otherwise it does.
aaronmdjones•12mo ago
No. SMTP and ESMTP are not using TLS, so there is no ciphersuite. SMTPS and ESMTPS do use TLS, so it will say which ciphersuite.
wcoenen•1y ago
Related note for those surprised that 3DES is still a thing: the Mastercard specifications still use 3DES for pin block encryption. This is used each time you enter the pin for a Mastercard card!

There is no alternative yet. Support for AES "coming soon".

https://developer.mastercard.com/card-management/documentati...

Bender•1y ago
Seems like they support more than 3DES. It might be interesting if they shared stats on how many legit MTA's are using old ciphers. Should exclude bots, scanners, etc... There are of course other mitigating factors such as PGP encrypting emails, accepting that some information is still disclosed. That can be further mitigated by using gmail to only perform the initial communication then go out of band for anything sensitive.

     SSLv2      not offered (OK)
     SSLv3      not offered (OK)
     TLS 1      offered (deprecated)
     TLS 1.1    offered (deprecated)
     TLS 1.2    offered (OK)
     TLS 1.3    offered (OK): final
    
     Testing cipher categories 
    
     NULL ciphers (no encryption)                      not offered (OK)
     Anonymous NULL Ciphers (no authentication)        not offered (OK)
     Export ciphers (w/o ADH+NULL)                     not offered (OK)
     LOW: 64 Bit + DES, RC[2,4], MD5 (w/o export)      not offered (OK)
     Triple DES Ciphers / IDEA                         offered
     Obsoleted CBC ciphers (AES, ARIA etc.)            offered
     Strong encryption (AEAD ciphers) with no FS       offered (OK)
     Forward Secrecy strong encryption (AEAD ciphers)  offered (OK)
Tested with testssl.sh [1]

[1] - https://github.com/testssl/testssl.sh